US8255505B2 - System for intelligent context-based adjustments of coordination and communication between multiple mobile hosts engaging in services - Google Patents
System for intelligent context-based adjustments of coordination and communication between multiple mobile hosts engaging in services Download PDFInfo
- Publication number
- US8255505B2 US8255505B2 US12/182,621 US18262108A US8255505B2 US 8255505 B2 US8255505 B2 US 8255505B2 US 18262108 A US18262108 A US 18262108A US 8255505 B2 US8255505 B2 US 8255505B2
- Authority
- US
- United States
- Prior art keywords
- context
- coordinator
- transactions
- mobile hosts
- services
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related, expires
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/023—Services making use of location information using mutual or relative location information between multiple location based services [LBS] targets or of distance thresholds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/51—Discovery or management thereof, e.g. service location protocol [SLP] or web services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/04—Protocols specially adapted for terminals or networks with limited capabilities; specially adapted for terminal portability
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/52—Network services specially adapted for the location of the user terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/029—Location-based management or tracking services
Definitions
- the present invention relates generally to wireless communications.
- an application responsible for mobile workforce management can update schedule information stored on MHs.
- schedule updates across several mobile workers need to be coordinated in the context of a transaction.
- some of the updates may fail.
- the application could choose to only update the mobile devices that can be updated with high probability and then attempt to update the rest at some later time.
- the remote application's ability to lock and/or commit resources is the only condition taken into account—its state in the physical world (e.g. distance to the coordinator) and relationship with system resources (e.g., network utilization) is ignored.
- each MH has rich computing and storage capabilities, i.e., effectively capable computers, as well as communication capabilities on one or more network types, e.g. cellular, 802.11 (aka “Wi-Fi”), WiMAX, etc.
- network types e.g. cellular, 802.11 (aka “Wi-Fi”), WiMAX, etc.
- MH's are always present in one particular area or “region of interest” which can be described in different ways, e.g., in terms of the cellular sector and/or cell (when present), Base Tranceiver Station (BTS) attached to the network (cellular, WiMAX, etc.), Wi-Fi Access Point, political borders (e.g., Nassau County, Village of Piscataway, etc.), GPS coordinates of the region, and/or street address.
- BTS Base Tranceiver Station
- Each MH can be considered a resource of media and/or information, and the MH may have a Resource Manager (RM) process that mitigates access to the media and/or other data.
- RM Resource Manager
- the MH may be capable of controlling read/write access to MH data.
- An MH without a RM can still participate in information exchange but in a more ad hoc, informal fashion (concurrent reads and writes on the MH's data may cause data integrity problems).
- MH's can participate in services in one of several ways. For example, participation can be with an RM carefully controlling create-read-update-delete (CRUD) access, or without an RM, allowing only Read access. In addition, participation without an RM, allowing full, trusted CRUD access is possible. In this case, neither the MH nor the service is concerned with ensuring traditional atomicity, consistency, isolation and durability (ACID) properties of access or transactions.
- CRUD create-read-update-delete
- ACID isolation and durability
- Stored media on the MH could include one or more of the following media types and metadata, i.e., songs and playlists, Internet favorites, photographs, videos, GPS information, application logs, and/or other mixable information.
- An MH could also be providing middleware or “infrastructure” type services (possibly mobile) to peers, offering functions like billing, auditing, validation and/or authentication, and recommendation.
- Access-style could very likely include peer-to-peer (finding peer through flooding, registries, etc.), and service-oriented (via standard W3C protocols such as UDDI, SOAP, WSDL). Either asynchronous or syncrhonous style access-style could be permitted.
- any type of coordination and/or communication between devices to render that service will often require several steps.
- Principle examples of these coordinations and communications are committing transactions where resources are stored on multiple distributed entities, forwarding information and files to multiple parties, establishing VoIP or cellular voice calls, such as two-party or multi-party, and sending reminders or other event types to one or a group of endpoints.
- FIG. 1 shows the messaging overhead created when using prior art techniques.
- call-setup and information forwarding requires large numbers of signaling and network and/or transport-level messaging. These resources are valuable, and the owners of these resources have great interest in keeping them loaded well below peak rates. In addition, false-starts and unsuccessful communications, e.g. to terminating ends that no longer want to accept the communication, are extremely wasteful and inefficient.
- Context is the set of circumstances and situations surrounding any event or entity.
- types of context could include current region of interest containing the MH, described above, current speed and direction of the MH, current state of the MH hardware, current weather in MH's region, and/or current cellular background traffic on the attached BTS.
- What is needed is a system and method providing intelligent context-based adjustment of coordination and communication between multiple mobile hosts engaging in services in which application-level information can occasionally be missed or somewhat inconsistent but the service is still of value to the recipient.
- the inventive solution is a system and method to exploit context in communications and coordinations with a goal that efficiency or quality of experience is increased.
- An intelligent coordinator IC is a functional part of the solution. It is deployed at or near the coordinator or initiator of a communication and/or coordination.
- the IC is an add-on functional component, that is, its removal does not destroy system functionality.
- IC Integrated Circuit
- functions and activities are performed by the IC, such as intercepting and reading the coordinator/initiator intent, understanding the protocol about to be used, e.g., 2PC, mimicking the coordinator/initiator role from the point of view of peers in this communication, manipulating and passing information back to the actual coordinator, interworking with internal knowledge bases to further understand the communication, interworking with external systems to further build context around the communication, and adding, removing, and/or modifying the number of participants in the communication and/or coordination.
- protocol about to be used e.g., 2PC
- the inventive system and method for intelligent, context-sensitive enhancement of transactions among a plurality of mobile hosts, each having a local coordinator, engaging in services comprises an actual coordinator and an intelligence coordinator that determines context regarding the mobile hosts, and leverages the context to enhance the transactions between the local coordinators and the actual coordinator.
- the context can be leveraged in order to reduce the number and/or the amount of data of the transactions.
- the context can comprise a physical location, temporal data, and a network load near and at a network location of the mobile host.
- the system can also have an application operating on the services, in which case, the intelligence coordinator can improve the performance of the application.
- the intelligence coordinator can receive and parse a meta-expression piggy-backed on a transaction message, use the parsed meta-expression to form thresholds, and based on the thresholds, the intelligence coordinator can eliminate—or otherwise affect subsequent messaging with—one or more mobile hosts engaging in the services to reduce a number of transactions.
- FIG. 1 shows messaging in the prior art
- FIG. 2 shows messaging in accordance with the present invention
- FIG. 3 shows interrelationships among entities according to an embodiment of the present invention
- FIG. 4 shows more detailed interrelationships among entities according to an embodiment of the present invention
- FIG. 5 is a flow diagram of an embodiment of the present invention.
- FIG. 6 shows a physical distribution of the components of an embodiment of the inventive system
- FIG. 7 shows the IC and its roles
- FIG. 8 is a ranking approach for one embodiment of the present system.
- FIG. 1 illustrates typical messaging requirements for a coordinator 10 to “commit” a transaction across several mobile hosts 12 (MH 1 , MH 2 , MH 3 , MH 4 ). This involves a series of messages towards the hosts 12 from the coordinator 10 and expected responses.
- the example in FIG. 1 shows a negative acknowledgement (NACK) by host MH 4 12 , the NACK causing the commit transaction to be rolled back, necessitating a maximum number of messages be used.
- NACK negative acknowledgement
- FIG. 2 illustrates a similar scenario as FIG. 1 but with the inventive Intelligent Coordinator (IC) 14 shown as a triangle, positioned first in the line of messaging (it does not matter how), enabling the IC 14 to take control of the commit procedure.
- the IC's presence may be transparent to the original coordinator 10 .
- the IC 14 determines additional context about the mobile hosts 12 who are involved in this transaction or coordination, and leverages that information to otherwise affect the details of the transaction procedure.
- two hosts or participants 12 MH 2 and MH 3 , have been eliminated from the coordination by the IC 14 .
- This component 14 mimics the coordinator 10 from the point of view of the participants 12 but serves to reduce the overall network requirements needed by the coordination. Note that in some protocols, like 2PC, removing participants 12 may have negative effects on the desired result of the transaction, e.g., the state of an MH 12 left out of a transaction may be out of date until its next synchronization.
- FIG. 3 shows the interrelationships between components and the IC 14 .
- the sequencing in the diagram is further described in FIG. 4 in accordance with a specific use case.
- the coordinator's 10 functions, and those of the RM of an MH 12 are existing and well-known, as shown in FIG. 1 .
- the media stores 16 and various applications 18 are known; services employing illustrative applications 16 are described below.
- the IC 14 function which may be transparent, serves as an interceptor of the coordinator's and/or RM's 12 intents as well as a receptor of messages.
- An external system 20 is one that provides an IC 14 with additional context regarding the RMs 12 , e.g. mobile hosts, in the transaction; additionally or alternatively, the IC 14 may use some context ‘knowledge’ 22 stored, by itself or by others, within reach locally (“knowledge” icon). The IC 14 may use such context 22 to manipulate the process of coordination to meet some goal. For example, if the goal is to be network efficient, then omitting some of the non-essential MHs 12 from the remaining messaging aspects of the transaction would be a possible decision of the IC 14 .
- the external system 20 is not a part of the invention but could be an application program interface (API) through which the IC 14 could interact, possibly over a network such as the Internet.
- API application program interface
- a major byproduct of the MH's and their media is the opportunity to create and offer services to other mobile or static hosts (static hosts may also host services). Services may involve just a pair of devices or entities, e.g., two MH's, or one MH and one static host, or may involve a large number of entities. This is not unreasonable as many current services and applications offer a large number of users the ability to connect and interact (though often via a single centralized server, and interaction is usually limited to text or voice chat); such large-number services include: multiplayer games (World of Warcraft, Halo, Sims, etc.), peer-to-peer applications, and social networking and meetup services.
- a first such service is Virtual Concierge.
- MH's register as service-providers, e.g. contractors, restaurants, tour-guides. Each service-provider also registers its constraints. MH's can then perform on-demand searching for service providers. Services may be rendered from reading and writing information to and from MH's of both providers and consumers.
- a second service is P2P photo-sharing and editing.
- MH's offer remote users the ability to read and edit selected photos stored in their platform. Clients “check-out” photos, edit them locally, and reinsert them into the owners' folders.
- a third service is Mobile Blogging.
- the blog-server is on the MH itself; remote readers leave comments on the blog page.
- a fourth service is Mobile device-centric multiplayer games.
- the MH stewards the game data, that is, operates as the game server or shares a part of the responsibility of saving the game state.
- MH's interact and share state change events in P2P fashion.
- state changes are missed between MH's, each MH diverges from the global state and is essentially in its own world; at a later time the game might pause and attempt global resynchronization.
- the innovative services provide flexibility, including flexible event delivery and flexible data and/or transaction consistency.
- Flexible event delivery means that it is not always necessary to ensure reliable and consistent delivery of information. That is, while reliable and consistent delivery may be desirable from the point of view of the applicant, it does not crash or become so inconsistent that it is unusable if messages are missed. Batch or aggregated messages may be sent at a later time to make up for some of the missed ones.
- Flexible data and/or transaction consistency is allowable in the applications of these services, including weak consistency, intermittent consistency, or sometimes no consistency. That is, while it may be desirable to have consistency, its absence does not cause catastrophic errors or failures. A later or subsequent global update can bring most parties to or “close” to a consistent state.
- a first use case is a photo-edit scenario in which MHs 12 can request to download, edit, and upload photos from a set of other MH's media stores 16 . The user may then use an application 18 to edit together or combine the photos, and may want to upload the modified photo back to all the original MHs 12 .
- FIG. 4 illustrates this scenario and FIG. 5 is a flow diagram corresponding to FIGS. 3 and 4 .
- the “dotted” (_._) straight lines divide physically distributed components, and the “dashed” (- - -) curved lines indicate distribution of physical platforms.
- step S 1 an application 18 , in response to a “save/sync” process described above, issues a request to re-upload the final edited photo to all the participants 12 .
- the coordinator 10 of this communication wishing to send multiple messages, one to each of many participants (two (2) are shown in FIG. 4 ), sends an initial message in step S 2 .
- the IC 14 intercepts the message in step S 3 .
- step S 4 the IC 14 accesses knowledge, such as a knowledge base, and external systems 20 , to determine the current and past context of the remote participants 12 that the coordinator 10 has identified.
- step S 5 An algorithm available to the IC 14 then determines in step S 5 that one of the participants 12 no longer needs the edited photo, and filters this participant 12 out completely. From the IC 14 point of view, nothing has changed.
- step S 6 the IC 14 propagates some upload or commit message to each local RM 12 and to the application 18 and its media store 16 .
- the IC 14 uses external and internal context to determine that a particular coordination should be altered due to the location of one or more of the participants and their MH's 12 . For example, the IC 14 may reason that since an MH 12 belonging to one of the participants is no longer in the region, e.g. cell, city, ZIP, in which the MH 12 was when a transaction was initiated or a coordination was triggered, then the MH 12 should no longer be considered in the remainder of the coordination.
- the region e.g. cell, city, ZIP
- an application on a participant's MH 12 communicates with other friends “physically nearby” and all the friends together form a “ring of information” that is dynamically synchronized to reflect changes, e.g. new status, new data changes to shared files, etc.
- changes e.g. new status, new data changes to shared files, etc.
- a MH 12 is kicking off a transaction to “commit” some changes the MH 12 considers, its IC 14 in turn uses some resource to understand that several of the friends have now left a given region, e.g. Greenwich Village area. Given this information, the IC 14 decides that the recent changes need not be committed on those friends' MHs 12 , e.g. they're no longer “playing the game”, so that the IC 14 manipulates the transaction accordingly by, for example, not sending the changes to the out-of-region MHs 12 .
- the IC 14 uses external systems 20 and internal context 22 to determine that a particular coordination should be altered due to a temporal issue. For example, it may be that the IC 14 reasons that since a particular piece of information is time-sensitive (e.g. flight status) and this particular information has not updated or changed since the last version, the IC 14 does not need to involve one or more of the participants 12 in the coordination at all.
- time-sensitive e.g. flight status
- the IC 14 uses an internal or external source to verify the “state” of a piece of information that is being “committed” amongst several mobile friends via their MHs 12 . Finding that the information has not changed since previous commits, the IC 14 does not involve certain participants 12 , thereby saving resources.
- the IC 14 uses external systems 20 to read and gather network traffic information, which could be obtained, for example from models or from monitoring systems. With traffic information as well as associations of participants to regions and network equipment, the IC 14 can effectively make the coordination sensitive to network traffic. For example, IC 14 may eliminate messages destined for participant A because A is in a cellular sector already loaded with traffic. IC 14 may reduce the size of messages to others, and/or perform filtering, for similar reasons. IC 14 may also add value-adding information not directly related to the coordination, e.g. piggybacking, to other participants 12 who are in lightly loaded broadband areas with hi-speed connectivity.
- the IC 14 may augment the coordination flow by adding participants 12 that the coordinator 10 is not necessarily aware of. For example, when A is committing an updated photo to a set of participants 12 , IC 14 may deem that some other participant M would be a beneficiary of such a photo and include it in the coordination.
- the IC 14 employs a variety of sensitivity factors and makes a decision based on some non-obvious combination of them. For example, if the IC 14 takes only time or only location into account, meaningful eliminations of messages may not result. However, by considering both time and location, the number of messages may be significantly reduced. In other words, the IC's reasoning for manipulating a transaction is not limited to the above use cases. A combination of such reasoning, or something else altogether, may be implemented by the IC 14 .
- FIG. 6 shows some of the artifacts of the inventive system, illustrating a physical distribution of the components.
- MH's 12 may be stewarding service data and offering services.
- Tens or hundreds of MH's 12 are potential peers that interact with the data and the services to perform activities, such as read, write, update.
- FIG. 6 illustrates that physical space may have a bearing on how IC 14 decides to affect the coordination, e.g. those remote participants 12 in certain regions or attached to certain switching centers may no longer be viable candidates for the coordination, even though they might have been only moments earlier.
- the IC 14 adds value to the messaging and services by using algorithms and heuristics to help meet high level consistency and messaging goals while benefiting the network operating party.
- the IC 14 receives or infers conditions, constraints, and values, such as MH 12 location, time-constraints, and associated network traffic at a current location, and uses this information to relax messaging and/or consistency, and further to determine the best way, if any, to meet consistency goals. In a coordination, this can involve piggybacking with high-level consistency goals.
- the algorithms employed by the IC 14 can incorporate well-known techniques, such as those for sorting lists of items. Sorting lists of items (single key) has known complexity.
- the well-known Bubble, Insertion, Selection, and Shell sorts are easy to implement and run in complexity O(n 2 ). Heap, Merge, and QuickSort are harder to implement and debug but run in O(nlogn) complexity. This bodes well even with hundreds of peers in a coordination.
- Using sorted order can create a desired effect.
- Painters algorithm and reverse Painters is a rendering technique in which objects needing to be rendered are ordered based on their distance. Then, the rendering occurs from most distant to closest (as a real painter might do).
- Z-buffering uses a similar approach.
- the IC 14 in addition to intercepting the “commit” request from an application 18 , is also able to parse meta-expressions that capture meta-details about a transaction.
- the application 18 can, in cooperation with an IC 14 , indicate what levels of consistency, and/or other information, the application 18 desires, and the IC 14 manipulates the transaction to try to meet the application's request.
- the IC 14 receives and understands meta-expressions from a participant 12 wishing to disseminate information to peers 12 in a coordination.
- the originating peer may piggyback high level goals for the coordination relating to how “consistent” the coordination should be, or to what extent messaging is necessary to every participant.
- the originator may name individual participants in these directives or simply express general goals and leave it to the IC 14 to resolve.
- the IC 14 parses these goals and does its best to satisfy them. Regardless, if the detailed meta-expressions are not provided by the originator, the IC may infer these as part of its computing.
- FIG. 7 shows the IC 14 and its roles.
- a meta-expression can also be formed and transmitted.
- the meta-expressions generated by the originating disseminator or application 18 may or may not include detailed meta-expressions. In some situations, the meta-expressions may only be very broad and the IC 14 may infer detailed ones.
- Concerns related to consistency and messaging, and, optionally, to timing constraints, network traffic, location, geospatial, and/or other application-level issues could be expressed in a mark-up language indicating consistency percentage, e.g. fraction of total participants to use, any n peers, these n peers, at least n peers, at most n peers.
- Two key functional operations of the IC 14 are also shown in FIG. 7 .
- One is “peer modification”, e.g. changing the transaction to meet goals or other constraints.
- the other is “measurements, sorting”, described below, by which the IC 14 comes to understand the context of the recipients, and how it will decide to eliminate certain recipients.
- Meta-expressions will be specified in a canonical form.
- One embodiment uses XML as syntax and an XML Schema as semantics; another uses an ontology based on description logics (e.g., built using the Web Ontology Language) for semantics.
- the meta-expressions are both well-understood by both the sender and recipient, and able to convey complex semantics.
- Some types of meta-expression information, exploited by IC 14 can be composite, network level, temporal, location, messaging and consistency information.
- FIG. 8 shows one ranking approach that can be used in one embodiment of the inventive system, that is the “measurements, sorting” function shown in FIG. 7 .
- This is one approach to sorting, ranking, eliminating peers in a coordination with respect to a) their distance (location), b) the temporal value, c) the network traffic at their location.
- location a distance
- temporal value a value that is the distance between the two devices.
- c the network traffic at their location.
- Other metrics are possible.
- This is an embodiment of an algorithm for sorting candidates based on various aspects of the context and provides IC 14 a basis for recipient elimination and/or transaction manipulation.
- the IC 14 knows the state of each recipient in terms of the distance from the IC 14 to the recipient, the background network traffic at the switching center where the recipient is, and the size of the “time-window” of opportunity, e.g. “5 min window” means that after 5 minutes from now, the recipient is almost surely a candidate for elimination.
- the time window may also be specified as an absolute time, e.g. 9:00 AM. How these metrics are arrived at is somewhat irrelevant, for example, IC 14 may use a combination of external Operational Support systems and other systems that help it make these rankings.
- FIG. 8 shows three possible rankings of the peers 12 .
- To choose the recipients to eliminate the IC 14 may create a sorted list, for example of best to worst candidates, for each attribute listed above. It will then look at the candidates below some threshold level and use those as a basis for elimination as they are the most likely to be irrelevant to the transaction.
- the IC 14 may set the “thresholds” for elimination by considering the meta-expressions provided by the application 18 regarding the urgency or consistency levels desired for this transaction.
- This inventive system can be implemented as computer software or a computer readable program for operating on a computer.
- the computer program can be stored on computer readable medium.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Information Transfer Between Computers (AREA)
- Computer And Data Communications (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
Description
-
- 1. Receive the high-level command from a coordinator
- 2. Parse the meta-expression, extracting the goal G and the participants P1 . . . Pn
- 3. Use internal or external knowledge to sort P1 . . . Pn on the basis of:
- a. network traffic at Pi's location
- b. Pi's distance from the coordinator
- c. Pi's time window of opportunity
- d. any other arbitrary context that can be quantified, such as: weather at the participant, hardware versions, etc.
- Results in 3 sorted lists: L1, L2, L3 where the “least desirable” participants can be determined by examining the list from one end.
- 4. Optional: the system can now use any explicit Rules that may eliminate certain participants. For example, a rule may be, “eliminate all participants within 50 m of the Empire State Building, regardless of their other attributes or ranking.”
- 5. Depending on the goal, determine how many of the participants should be eliminated—say m participants. Create a threshold bar in each list that divides those m participants from the rest.
- 6. Three cases are possible:
- a. each List contains the same “least desirable” elements. In this case eliminate those and the reduction is finished
- b. the Lists share 1 or more elements, between 2 or more lists. In this case eliminate those and resort each list.
- c. the Lists share no elements. In this case the thresholds can be relaxed (the bar in the Figure slides downwards) or another metric can be used to decide the “least desirable” participants across all metrics.
Re-sort lists and repeat if necessary.
Claims (15)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/182,621 US8255505B2 (en) | 2007-07-30 | 2008-07-30 | System for intelligent context-based adjustments of coordination and communication between multiple mobile hosts engaging in services |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US96256107P | 2007-07-30 | 2007-07-30 | |
US12/182,621 US8255505B2 (en) | 2007-07-30 | 2008-07-30 | System for intelligent context-based adjustments of coordination and communication between multiple mobile hosts engaging in services |
Publications (2)
Publication Number | Publication Date |
---|---|
US20090037928A1 US20090037928A1 (en) | 2009-02-05 |
US8255505B2 true US8255505B2 (en) | 2012-08-28 |
Family
ID=40304837
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/182,621 Expired - Fee Related US8255505B2 (en) | 2007-07-30 | 2008-07-30 | System for intelligent context-based adjustments of coordination and communication between multiple mobile hosts engaging in services |
Country Status (5)
Country | Link |
---|---|
US (1) | US8255505B2 (en) |
EP (1) | EP2186016B1 (en) |
KR (1) | KR101206878B1 (en) |
CA (2) | CA2897110C (en) |
WO (1) | WO2009018339A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120109345A1 (en) * | 2010-11-02 | 2012-05-03 | Gilliland Randall A | Music Atlas Systems and Methods |
US9218383B2 (en) | 2013-03-15 | 2015-12-22 | International Business Machines Corporation | Differentiated secondary index maintenance in log structured NoSQL data stores |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020161862A1 (en) | 2001-03-15 | 2002-10-31 | Horvitz Eric J. | System and method for identifying and establishing preferred modalities or channels for communications based on participants' preferences and contexts |
US6742037B1 (en) * | 1998-12-01 | 2004-05-25 | Nortel Networks Limited | Method and apparatus for dynamic information transfer from a mobile target to a fixed target that tracks their relative movement and synchronizes data between them |
US20050273668A1 (en) * | 2004-05-20 | 2005-12-08 | Richard Manning | Dynamic and distributed managed edge computing (MEC) framework |
US6985933B1 (en) * | 2000-05-30 | 2006-01-10 | International Business Machines Corporation | Method and system for increasing ease-of-use and bandwidth utilization in wireless devices |
US20060168101A1 (en) * | 2001-07-20 | 2006-07-27 | Dmytro Mikhailov | Proactive browser system |
US20070018851A1 (en) | 2002-10-30 | 2007-01-25 | Veco Gas Technology, Inc. | Intelligent wireless multicast network |
US7206805B1 (en) * | 1999-09-09 | 2007-04-17 | Oracle International Corporation | Asynchronous transcription object management system |
US20080189360A1 (en) * | 2007-02-06 | 2008-08-07 | 5O9, Inc. A Delaware Corporation | Contextual data communication platform |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030018704A1 (en) * | 2001-03-08 | 2003-01-23 | Vasilis Polychronidis | Network presence and location agent |
US20040153373A1 (en) * | 2003-01-31 | 2004-08-05 | Docomo Communications Laboratories Usa, Inc. | Method and system for pushing services to mobile devices in smart environments using a context-aware recommender |
US20060294191A1 (en) * | 2005-06-24 | 2006-12-28 | Justin Marston | Providing context in an electronic messaging system |
WO2007044512A2 (en) * | 2005-10-07 | 2007-04-19 | Neoedge Networks, Inc. | Service and messaging infrastructure to support creation of distributed, peer to peer applications with a service oriented architecture |
-
2008
- 2008-07-30 KR KR1020107004747A patent/KR101206878B1/en active Active
- 2008-07-30 CA CA2897110A patent/CA2897110C/en not_active Expired - Fee Related
- 2008-07-30 US US12/182,621 patent/US8255505B2/en not_active Expired - Fee Related
- 2008-07-30 WO PCT/US2008/071591 patent/WO2009018339A1/en active Application Filing
- 2008-07-30 CA CA2695189A patent/CA2695189C/en not_active Expired - Fee Related
- 2008-07-30 EP EP08796851.7A patent/EP2186016B1/en not_active Not-in-force
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6742037B1 (en) * | 1998-12-01 | 2004-05-25 | Nortel Networks Limited | Method and apparatus for dynamic information transfer from a mobile target to a fixed target that tracks their relative movement and synchronizes data between them |
US7206805B1 (en) * | 1999-09-09 | 2007-04-17 | Oracle International Corporation | Asynchronous transcription object management system |
US6985933B1 (en) * | 2000-05-30 | 2006-01-10 | International Business Machines Corporation | Method and system for increasing ease-of-use and bandwidth utilization in wireless devices |
US20020161862A1 (en) | 2001-03-15 | 2002-10-31 | Horvitz Eric J. | System and method for identifying and establishing preferred modalities or channels for communications based on participants' preferences and contexts |
US20060168101A1 (en) * | 2001-07-20 | 2006-07-27 | Dmytro Mikhailov | Proactive browser system |
US20070018851A1 (en) | 2002-10-30 | 2007-01-25 | Veco Gas Technology, Inc. | Intelligent wireless multicast network |
US20050273668A1 (en) * | 2004-05-20 | 2005-12-08 | Richard Manning | Dynamic and distributed managed edge computing (MEC) framework |
US20080189360A1 (en) * | 2007-02-06 | 2008-08-07 | 5O9, Inc. A Delaware Corporation | Contextual data communication platform |
Non-Patent Citations (1)
Title |
---|
International Search Report, dated Oct. 22, 2008. |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120109345A1 (en) * | 2010-11-02 | 2012-05-03 | Gilliland Randall A | Music Atlas Systems and Methods |
US9218383B2 (en) | 2013-03-15 | 2015-12-22 | International Business Machines Corporation | Differentiated secondary index maintenance in log structured NoSQL data stores |
US9218385B2 (en) | 2013-03-15 | 2015-12-22 | International Business Machines Corporation | Differentiated secondary index maintenance in log structured NoSQL data stores |
US10078682B2 (en) | 2013-03-15 | 2018-09-18 | International Business Machines Corporation | Differentiated secondary index maintenance in log structured NoSQL data stores |
US10078681B2 (en) | 2013-03-15 | 2018-09-18 | International Business Machines Corporation | Differentiated secondary index maintenance in log structured NoSQL data stores |
Also Published As
Publication number | Publication date |
---|---|
WO2009018339A1 (en) | 2009-02-05 |
KR20100053600A (en) | 2010-05-20 |
EP2186016A1 (en) | 2010-05-19 |
KR101206878B1 (en) | 2012-11-30 |
EP2186016A4 (en) | 2012-08-29 |
CA2897110C (en) | 2016-11-22 |
EP2186016B1 (en) | 2013-09-11 |
US20090037928A1 (en) | 2009-02-05 |
CA2695189C (en) | 2015-11-10 |
CA2897110A1 (en) | 2009-02-05 |
CA2695189A1 (en) | 2009-02-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10050879B2 (en) | Techniques for selecting content based on network conditions | |
US9390396B2 (en) | Bootstrapping social networks using augmented peer to peer distributions of social networking services | |
US8843560B2 (en) | Social networking for mobile devices | |
JP4560513B2 (en) | Method and apparatus for sharing resources via handset terminal | |
US10917374B2 (en) | Techniques to visualize messaging flow | |
US8005906B2 (en) | Contextual mobile local search based on social network vitality information | |
US8265050B2 (en) | System and method for sharing a payload among mobile devices in a wireless network | |
US20100015975A1 (en) | Profile service for sharing rights-enabled mobile profiles | |
US9891970B2 (en) | Techniques to share application data through a messaging system | |
US20240031466A1 (en) | Techniques to manage contact records | |
JP2015522879A (en) | Service device, method and storage medium for providing offline message | |
US9736754B2 (en) | Data distribution to portable electronic devices | |
US8255505B2 (en) | System for intelligent context-based adjustments of coordination and communication between multiple mobile hosts engaging in services | |
US11310315B1 (en) | Techniques for directive-based messaging synchronization | |
US8856204B2 (en) | Managing service provider messaging | |
US11418928B1 (en) | Duplicate message management | |
US10313503B2 (en) | Techniques to reconfigure messaging clients during contact information changes | |
EP2138964A1 (en) | Social networking protocol for mobile social networks | |
US11722443B1 (en) | Techniques for media item display configuration | |
Curran | Understanding the Internet: a glimpse into the building blocks, applications, security and hidden secrets of the Web | |
CN108566635A (en) | A D2D routing selection method | |
Lombera et al. | Decentralized search and retrieval for mobile networks using SMS | |
Cozzolino | Design and implementation of and Android context-aware application based on Floating Content | |
EP2224654A1 (en) | Method and system for distribution of presence information |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: TELCORDIA TECHNOLOGIES, INC., NEW JERSEY Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:FALCHUK, BENJAMIN W.;LOEB, SHOSHANA K.;REEL/FRAME:021512/0807;SIGNING DATES FROM 20080803 TO 20080804 Owner name: TELCORDIA TECHNOLOGIES, INC., NEW JERSEY Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:FALCHUK, BENJAMIN W.;LOEB, SHOSHANA K.;SIGNING DATES FROM 20080803 TO 20080804;REEL/FRAME:021512/0807 |
|
ZAAA | Notice of allowance and fees due |
Free format text: ORIGINAL CODE: NOA |
|
ZAAB | Notice of allowance mailed |
Free format text: ORIGINAL CODE: MN/=. |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
CC | Certificate of correction | ||
FPAY | Fee payment |
Year of fee payment: 4 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 8 |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
LAPS | Lapse for failure to pay maintenance fees |
Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20240828 |